Developing cyber defense strategies against future enemy threats on the horizon of 1405

Cyber ​​threats against the Islamic Republic of Iran have been on the rise in recent years. Cyberspace, although after land, sea, air and space, is considered as the fifth dimension of military battles, but due to major differences such as; Very rapid, widespread and continuous changes, user anonymi...

Full description

Bibliographic Details
Main Author: Mohammad Sepehri
Format: Article
Language:English
Published: Command and Staff University 2022-02-01
Series:آینده‌پژوهی دفاعی
Subjects:
Online Access:http://www.dfsr.ir/article_249587_a0614e880c7ce5b977484d7b7ee37d35.pdf
Description
Summary:Cyber ​​threats against the Islamic Republic of Iran have been on the rise in recent years. Cyberspace, although after land, sea, air and space, is considered as the fifth dimension of military battles, but due to major differences such as; Very rapid, widespread and continuous changes, user anonymity, borderlessness, chaos and its combination with other dimensions of warfare, compared to other operational environments, have unique features. The main purpose of this article is to achieve the country's cyber defense strategies against the enemy's cyber threats in the horizon of 1405. Deals with cyber defense technologies. This applied and developmental research, its research method is mixed from case-context type, documentary data collection and survey method and its tools are interviews and statistical population of 60 people, which uses SWOT matrix to analyze indoor and outdoor environment and formulate strategies and TOPSIS software was used to determine the prioritization of the country's cyber defense strategies against the enemy cyber threats and its most important strategy is localization and smarting  of the country's cyber software and hardware systems in terms of processes, systems, standards, protocols, procedures and procedures using power and capacity. The purpose of the country's universities and research centers is to protect and increase cyber deterrence against enemy threats and cyber attacks.
ISSN:2588-428X
2645-7172